[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Israel Sold American Weapons to Azerbaijan to Kill Armenian Christians

Daily MEMES YouTube Hates | YouTube is Fighting ME all the Way | Making ME Remove Memes | Part 188

New fear unlocked while stuck in highway traffic - Indian truck driver on his phone smashes into

RFK Jr. says the largest tech companies will permit Americans to access their personal health data

I just researched this, and it’s true—MUST SEE!!

Savage invader is disturbed that English people exist in an area he thought had been conquered

Jackson Hole's Parting Advice: Accept Even More Migrants To Offset Demographic Collapse, Or Else

Ecuador Angered! China-built Massive Dam is Tofu-Dreg, Ecuador Demands $400 Million Compensation

UK economy on brink of collapse (Needs IMF Bailout)

How Red Light Unlocks Your Body’s Hidden Fat-Burning Switch

The Mar-a-Lago Accord Confirmed: Miran Brings Trump's Reset To The Fed ($8,000 Gold)

This taboo sex act could save your relationship, expert insists: ‘Catalyst for conversations’

LA Police Bust Burglary Crew Suspected In 92 Residential Heists

Top 10 Jobs AI is Going to Wipe Out

It’s REALLY Happening! The Australian Continent Is Drifting Towards Asia

Broken Germany Discovers BRUTAL Reality

Nuclear War, Trump's New $500 dollar note: Armstrong says gold is going much higher

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!

Whatever Happened to Robert E. Lee's 7 Children

Is the Wailing Wall Actually a Roman Fort?

Israelis Persecute Americans

Israelis SHOCKED The World Hates Them

Ghost Dancers and Democracy: Tucker Carlson


Resistance
See other Resistance Articles

Title: For some of you mixed-upped&krazy Amerikans: The WikiLeaks Battle: Should Information Be Shared or Censored?
Source: Wharton
URL Source: http://knowledge.wharton.upenn.edu/ ... er_friendly.cfm?articleid=2653
Published: Dec 8, 2010
Author: staff
Post Date: 2010-12-10 03:38:19 by buckeroo
Keywords: None
Views: 83
Comments: 5

The WikiLeaks Battle: Should Information Be Shared or Censored? Published : December 08, 2010 in Knowledge@Wharton

Julian Assange, the Australian founder of WikiLeaks, the controversial website that has been posting classified government documents, is now being held without bail in the U.K., awaiting extradition to Sweden for questioning regarding an alleged rape. But sensational news aside, his site's recent release of confidential U.S. State Department cables has implications for businesses and corporations with sensitive information to shield, according to experts at Wharton and the University of Pennsylvania.

"WikiLeaks is a fascinating microcosm of a larger trend -- that the Internet allows freer flow of information, including things we want to be available and things we don't," says Wharton professor of legal studies and business ethics Kevin Werbach. While premeditated leaks and other types of unauthorized disclosures are nothing new, he adds, digital technology makes it much easier for "one disgruntled individual" to unleash massive troves of information almost instantaneously.

For many, the WikiLeaks case has opened up a fundamental debate over privacy of information versus public access on the open web. In a column on The Guardian's website on December 6, John Naughton wrote: "The most obvious lesson [of the WikiLeaks case] is that it represents the first really sustained confrontation between the established order and the culture of the internet. There have been skirmishes before, but this is the real thing." Indeed, while Assange is behind bars, WikiLeaks and other "mirror sites" that have sprung up to distribute its material are threatening to release a code that would unleash more sensitive, uncensored data from governments and corporations if Assange is killed or convicted. On December 8, the site said the arrest would not stop it from posting new revelations, and WikiLeaks subsequently published a new set of cables about the British government's decision to release convicted Libyan Lockerbie bomber Abdel Baset Ali al-Megrahi.

For companies, the WikiLeaks case may ultimately serve as a parable on guarding sensitive information. Joseph Turow, professor of communication at the University of Pennsylvania's Annenberg School for Communication, says the State Department cables released by WikiLeaks, while controversial, are perhaps more well-thought-out than most internal corporate communications. "If I were a CEO, this would not make me feel comfortable. I would be very concerned that this would happen in my company," he says. "The cables that have been released look incredibly tame compared to the e-mail that people send around corporations."

Bad Publicity and Trade Secrets

Bruce Schneier, an author of books on cyber-security and founder of BT Counterpane, a security firm, argues that WikiLeaks rose up because of an excessive amount of classification of information and a weak press that "acts like a stenographer" for the government. He adds that the U.S. government is now experiencing what the music and entertainment industries have endured during the past several years -- digital distribution networks that sprang up as alternatives to the systems that recording labels and producers tried to control.

Although WikiLeaks has been disseminating information for 18 months, much of it about the Iraq and Afghanistan wars, Werbach notes that the state department communiqués seem to have raised the site's profile and generated a strong reaction. For example, credit card companies, PayPal and Amazon decided to cut off links that helped fund WikiLeaks, apparently under pressure from government officials. "It's dangerous when [the] government tells private companies that certain content should be kept off the network," he notes. It is also "reasonable for companies to be thinking about whether WikiLeaks crossed the line in its most recent disclosures."

Andrea Matwyshyn, Wharton professor of legal studies and business ethics, says society is struggling to find a balance between control of information and disclosures that may help the nation "better plot its own trajectory." Governments and corporations should focus less on WikiLeaks and more on the initial source of disclosures, she notes, because "once [information] goes out into the wild blue yonder of the Internet, getting it back from cyberspace is impossible."

Indeed, Australian Foreign Minister Kevin Rudd, who was identified as a "control freak" in the cables, says it is not Assange who is responsible for the unauthorized release of more than 200,000 diplomatic documents. "The bad people in this little exercise are the people who gave the information to him, because they are the people who breached the trust. They deserve to be chased and prosecuted," Rudd told reporters. Army Pfc. Bradley Manning has confessed in online chats that he downloaded classified documents from Army networks -- including U.S. State Department cables -- and gave them to WikiLeaks. He is being held at the U.S. Marine Corps brig at Quantico, Va. and faces 52 years in prison on charges of passing unauthorized information from military computers.

In addition to preventing bad publicity, Matwyshyn points to the importance of a proactive strategy to protect corporate trade secrets in the courts. She notes that a company does not really know if its information is a trade secret until it is forced to challenge a suspected violator in court. Rulings on whether a legitimate trade secret has been breached depend heavily on whether a company can prove that it valued a piece of intellectual property enough to take adequate steps to protect it from leaking outside the organization.

Companies "fail chronically" to establish a system-wide approach to the protection of information and rely, too often, on technology-based security solutions, Matwyshyn says. "They think that if they have a strong IT department they are covered. That's the wrong approach, because information flows need to be monitored not only through information technology, but holistically throughout the entire organization."

Wharton management professor Lawrence Hrbeiniak says that the WikiLeaks disclosures have prompted him to think about the strategic implications of outsourcing -- for better or worse. He notes that one WikiLeaks release was a so-called "hit list" of government and private sector facilities around the world -- including vaccine and essential medicines plants, mines and industrial facilities -- that, if attacked, could harm the U.S. population. "Outsourcing for governments and companies has benefits, but it also increases one's dependency [on] or vulnerability [to] those who control what the governments or companies need," he says. "WikiLeaks suggests this vulnerability for governments, but the same implications exist for companies. Extreme dependency on others can increase their power and control over us."

A 'Cyborg Dynamic'

Top managers need to have the mindset that information security is important and work collaboratively across internal divisions to preemptively plug sources of potential leaks, Matwyshyn and other experts say. In the case of the diplomatic cables, the State Department decided that for the sake of convenience, employees would be able to use thumb drives which resulted in "default permission" to copy materials, according to Matwyshyn. "And this person copied it and walked out the door."

Even employees restricted by confidentiality agreements break those contracts with results that can have ramifications beyond the employee-employer relationship, Matwyshyn notes. Organizations that depend on keeping secrets need to develop systemic processes covering information sharing. She observes that a duality is taking place throughout business in approaches to corporate information. On the one hand, the rise of social media has made companies eager to embrace the Internet to connect with new customers and build a greater presence in communities. "For marketing purposes," Matwyshyn says, "technology and outreach is a boon." At the same time, she continues, a "cyborg dynamic" is developing. Companies are increasing the use of technology internally. As they become more mechanized, and less human, they rely on the integration of computer systems to secure sensitive information, which she notes "may or may not be operating optimally."

Matwyshyn argues that computer-based information systems need "human backstops" who are able to look at the larger picture of information security on an ongoing basis to determine where information flows are being used and where they might need to be redirected. She suggests corporations develop new systems for information sharing from the top down through the collaboration of the chief technology officer, chief security officer, the CEO and other officer-level positions. Working together, high-level executives should be able to develop integrated and thoughtful information sharing policies along with the corporate culture to enhance and enforce the rules. "These are decisions that need to come from the top and create a culture of information care within an organization -- not only for its own information but for the security of consumer information the organization possesses."

Businesses now possess huge amounts of customer data that is vulnerable to premeditated, as well as accidental, disclosure, Matwyshyn points out. Consumers, she notes, are growing increasingly alarmed about letters they receive from companies indicating that their private information has been breached. In the past decade, 45 states have created statutes requiring companies to notify consumers of the possibility that their secure information may have been breached. "The arrival of a widespread regime of law is unprecedented in its speed," she says, reflecting "a consumer outcry and heightened concerns over control." Consumers want to be able to share the information to gain better access to products and services, but they also want that information contained, leading to what academics call the "privacy paradox."

"Consumers are looking for a regime of trust and the ability to have some kind of input on their data usage. Essentially, [they want to] have a stronger contractual regime around the licensing of their information," says Matwyshyn, who adds that it is possible to imagine a time when companies would be liable for damages for lapses in protecting consumer information. "But consumers aren't really interested in seeking damages. They simply want to control their information."

It Boils Down to Trust

In the aftermath of the WikiLeaks furor, Pentagon and State Department officials have said some foreign officials now seem reluctant to trust U.S. officials. "We have already seen some indications of meetings that used to involve several diplomats and now involve fewer diplomats," said State Department spokesman P.J. Crowley. "We're conscious of at least one meeting where it was requested that notebooks be left outside the room."

According to Turow, there is a tension between the need for corporate executives to be able to communicate honestly and openly and the potential fallout if frank discussions are later revealed. He suggests highly sensitive matters should not be committed to writing or should have tight information controls. While companies can adopt best practices for information management, such as limits on the amount of material an individual can download, there is no technology to guard against a determined rogue individual. "In the end, it comes down to the trust of your employees. Their loyalty is what [counts]."

Werbach says the most recent WikiLeaks information releases reflect less focus on scandal than in the past. The cables, he notes, are mostly day-to-day communications that are interesting, but do not seem to represent dangerous secrets. It is likely the U.S. government has more sensitive communications behind tighter security, he adds. Still, "the number of corporate laptops that are stolen and are not encrypted is truly frightening."

And while the volume of leaks of U.S. communications seems large, it is probably only a small fraction of the "daily chatter" in diplomatic networks, Werbach points out. He notes that high level discussions between the President and Chinese leaders or about nuclear strategy are likely protected by tight access. Any organization needs to prioritize the level of information it wants to protect and set up appropriate levels of security, he says. "You can't just put a cone of silence around everything."

This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: buckeroo (#0)

Crazy Zionists pushing their propaganda however they can. Watch out for the light, it will blind you buck.

God is always good!

RickyJ  posted on  2010-12-10   3:41:58 ET  Reply   Trace   Private Reply  


#2. To: RickyJ (#1)

I posted the article at 03:38 and you replied with a peculiar retort in about 3 minutes. How did you manage to read the entire article and consider the issues presented, much less make a retort that is off-the-wall and not even in keeping within the article's framework?

"In a free society we're supposed to know the truth," ... "In a society where truth becomes treason, then we're in big trouble. And now, people who are revealing the truth are getting into trouble for it" -- Ron Paul, circa 2010-12-02

buckeroo  posted on  2010-12-10   3:49:29 ET  Reply   Trace   Private Reply  


#3. To: RickyJ, buckeroo (#1)

How WW2 Started

Itistoolate  posted on  2010-12-10   3:53:56 ET  Reply   Trace   Private Reply  


#4. To: buckeroo (#0)

Wharton management professor Lawrence Hrbeiniak says that the WikiLeaks disclosures have prompted him to think about the strategic implications of outsourcing -- for better or worse.

Ah, Problem-Reaction-Solution: outsourcing. Guess where.

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2010-12-10   5:27:25 ET  Reply   Trace   Private Reply  


#5. To: buckeroo (#0)

For many, the WikiLeaks case has opened up a fundamental debate over privacy of information versus public access on the open web.

There hasn't been any debate over our privacy as private people. The governments of the world run roughshod over these "rights" at every opportunity.

The so-called "fundamental" debate is possibly a provoked retaliation against publicly financed entities that spy on private people while they stomp around the world killing and maiming children.

While we sit and argue about whether Assange is a good guy or not, the perps like Rothschild and Rockefeller count their marbles and drop bombs on babies for financial gain as they trick fuck the world into believeing that REAL COUNTRIES are bankrupt and fake-ass bankers are solvent !

Every loyal citizen (AKA PATRIOT) should commit themselves today to making the largest deposit of precious metals that they are capable of at their bankers main office !

"Let us hear the conclusion of the whole matter: Revere God, and keep his commandments: for this is the whole duty of man".

noone222  posted on  2010-12-10   6:08:37 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]